Deck 6: Security Management Models

ملء الشاشة (f)
exit full mode
سؤال
When MACs are implemented,users and data owners have limited control over access to information resources.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Separation of duties is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.
سؤال
Information Technology-Code of Practice for Information Security Management was originally published as British Standard BS7799.
سؤال
In the TCSEC,the reference monitor is the combination of all hardware,firmware,and software responsible for enforcing the security policy.
سؤال
Management controls deal with the functions of security that have been integrated into the repeatable processes of the organization.
سؤال
ISO 27002 is an international standard for computer security certification,considered to be the successor to both TCSEC and ITSEC.
سؤال
There are two types of covert channels,storage channels and network channels.
سؤال
Role-based controls are tied to the role that a particular user performs in an organization,whereas content-based controls are tied to a particular assignment or responsibility.
سؤال
Compensating controls remedy a circumstance or mitigate damage done during an incident.
سؤال
Lattice-based access control assigns users a matrix of authorizations for particular areas of access.
سؤال
TCSEC is also known as the "Orange Book" and is considered the cornerstone of the DoD Rainbow Series that defines the criteria for assessing the access controls in a computer system.
سؤال
Within lattice-based access controls,the row of attributes associated with a particular subject (such as a user)is referred to as a capabilities table.
سؤال
ITSEC is the international set of equivalent for evaluating computer systems,and is very similar to the TCSEC.
سؤال
In rule-based access controls,access is granted based on a set of rules which may be specified by the central authority.
سؤال
The 'need to know' principle limits a user's access to the specific information required to perform the currently assigned task,and not merely to the category of data required for a general work function.
سؤال
All security models discussed in the text are freely available to the public.
سؤال
ISO/IEC 17799 is designed to promote certification of information security management system.
سؤال
Bell-LaPadula security rules prevent information from being moved from a level of higher security to a level of lower security.
سؤال
Preventative controls discourage or deter an incipient incident.
سؤال
An information security blueprint describes existing controls and identifies other necessary security controls.
سؤال
Under the Clark-Wilson model,internal consistency means that the system is consistent with similar data in the outside world.
سؤال
An ATM machine is a common example of a(n)constrained user interface form of access control._________________________
سؤال
Operational controls cover security processes designed by strategic planners,are integrated into the organization's management practices and are routinely used by security administrators to design,implement and monitor other control systems._________________________
سؤال
TCSEC is a U.S.DoD standard that is also known as the Red Book,because of its color-coding._________________________
سؤال
Need to know limits a user's access to the specific information required to perform the currently assigned task,and not merely to the category of data required for a general work function._________________________
سؤال
The trusted computing base is the piece of the system that manages access controls under TCSEC._________________________
سؤال
The NIST Security model documents enjoy two notable advantages over many other sources of security information: (1)They are publicly available at no charge,and (2)they have been available for some time and thus have been broadly reviewed by government and industry professionals.
سؤال
Covert channels are unauthorized or unintended methods of communications hidden inside a computer system._________________________
سؤال
The ITSEC is the international set of criteria for evaluating computer systems and is very similar to the TCSEC._________________________
سؤال
The major process steps in the ISO 27000 series include Plan-Do-Check-Act.
سؤال
The information security blueprint serves as the basis for the design,selection,and implementation of all subsequent security controls._________________________
سؤال
Discretionary controls are determined by a central authority in the organization._________________________
سؤال
Deterrent controls help an organization avoid an incident._________________________
سؤال
Another data classification scheme is the personnel security clearance structure,in which each user of an information asset is assigned an authorization level that identifies the level of information classification he or she can access._________________________
سؤال
Under the Common Criteria for IT Security Evaluation,a(n)Security Target is the system being evaluated._________________________
سؤال
A security framework is a generic blueprint offered by a service organization._________________________
سؤال
Classified documents should not be disposed of in trash otherwise people who engage in refuse recovery (digging through the trash)may retrieve information and thereby compromise the security of the organization's information assets._________________________
سؤال
COBIT is an IT development framework and supporting toolset that allows managers to bridge the gap between control requirements,technical issues,and design specifications.
سؤال
The Brewer-Nash model is commonly known as a Japanese wall.
سؤال
In an access control matrix,as part of lattice-based controls,the column of attributes associated with a particular object (such as a printer)is referred to as a(n)capability table._________________________
سؤال
The individual categories of data classification (Unclassified,Confidential,Secret etc.)are also called ____.

A) discretionary access controls
B) task-based access controls
C) security clearances
D) sensitivity levels
سؤال
____ is an international standard framework that is based on the security model Information Technology-Code of Practice for Information Security Management.

A) ISO/IEC 17799
B) NIST SP 800-12
C) RFC 2196
D) NIST SP 800-26
سؤال
The primary objective of the Committee of Sponsoring Organizations of the Treadway Commission (COSO),a private-sector initiative formed in 1985,is to identify the factors that cause fraudulent financial reporting and to make recommendations to reduce its incidence._________________________
سؤال
Controls that remedy a circumstance or mitigate damage done during an incident as called ____,

A) preventative
B) deterrent
C) corrective
D) compensating
سؤال
A(n)____ is a generic blueprint offered by a service organization.

A) framework
B) security outline
C) organizational model
D) security model
سؤال
The Biba model is a state machine model that helps ensure the confidentiality of an information system by means of MACs,data classification,and security clearances._________________________
سؤال
One of the key elements of the Clark-Wilson model is the unconstrained data item which is a data item with protected integrity._________________________
سؤال
Controls that are tied to the position assigned to and performed by an individual user in the organization are called ____.

A) mandatory access controls
B) lattice-based access controls
C) role-based access controls
D) rule-based access controls
سؤال
The original purpose of ISO/IEC 17799 was to give recommendations for information security management for use by those who are responsible for initiating,implementing,or maintaining security in their organization._________________________
سؤال
The objective of COBIT is to identify the factors that cause fraudulent financial reporting and to make recommendations to reduce its incidence._________________________
سؤال
Controls that discourage an incipient incident are called ____.

A) preventative
B) deterrent
C) corrective
D) compensating
سؤال
Controls that help an organization avoid an incident are called ____.

A) preventative
B) deterrent
C) corrective
D) compensating
سؤال
The principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties is known as ____.

A) need-to-know
B) eyes only
C) least privilege
D) separation of duties
سؤال
One discretionary model is ____,in which access is granted based on a set of rules specified by the central authority.

A) mandatory access controls
B) lattice-based access controls
C) role-based access controls
D) rule-based access controls
سؤال
Controls that are structured and coordinated within a data classification scheme that rates each collection of information as well as each user are called ____.

A) mandatory access controls
B) lattice-based access controls
C) role-based access controls
D) rule-based access controls
سؤال
____ specifies the authorization classification of information asset an individual user is permitted to access,subject to the need-to-know principle.

A) Discretionary access controls
B) Task-based access controls
C) Security clearances
D) Sensitivity levels
سؤال
The U.S.government data classification and security clearance system is an example of which of the following types of access controls?

A) Mandatory access controls
B) Lattice-based access controls
C) Role-based access controls
D) Rule-based access controls
سؤال
A control requiring that significant tasks be split up in such a way that more than one individual is responsible for their completion is known as ____.

A) need-to-know
B) eyes only
C) least privilege
D) separation of duties
سؤال
An outline of an information security blueprint is called a(n)____.

A) summary
B) framework
C) index
D) model
سؤال
Which of the following is the primary purpose of ISO/IEC 27001:2005?

A) Use within an organization to formulate security requirements and objectives
B) Implementation of business-enabling information security
C) Use within an organization to ensure compliance with laws and regulations
D) To enable organizations that adopt it to obtain certification
سؤال
Under the TCSEC model,the term ____ can be misleading-note that in this context,it means that components are part of the TCB security system,but it does not necessarily follow that they are all above reproach.

A) reference monitor
B) trusted
C) covert
D) security policy
سؤال
Under the Biba model,the ____ property permits a subject to have write access to an object only if the security level of the subject is equal to or higher than that of the object.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
سؤال
Under lattice-based access controls,the column of attributes associated with a particular object (such as a printer)is referred to as a(n)____.

A) access control list
B) capabilities table
C) access control matrix
D) sensitivity level
سؤال
Under the Common Criteria,____ is the document describing the system being evaluated's security properties.

A) Target of Evaluation (ToE)
B) Protection Profile (PP)
C) Security Target (ST)
D) Security Functional Requirements (SFRs)
سؤال
____ access controls are implemented at the option of the data user.

A) Mandatory
B) Nondiscretionary
C) Discretionary
D) Lattice-based
سؤال
Under ITSEC,what is the highest level of assessment a product can be rated?

A) EAL7
B) E1
C) E6
D) A1
سؤال
Under the Bell-LaPadula model,the ____ property prohibits a subject of lower clearance from reading an object of higher classification,but allows a subject with a higher clearance level to read an object at a lower level.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
سؤال
Under the Common Criteria,____ is the user-generated specifications for security requirements.

A) Target of Evaluation (ToE)
B) Protection Profile (PP)
C) Security Target (ST)
D) Security Functional Requirements (SFRs)
سؤال
Under the Biba model,the ____ property permits a subject to have read access to an object only if the security level of the subject is either lower or equal to the level of the object.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
سؤال
An Automated Teller Machine (ATM)is an example of a ____.

A) content-dependent access control
B) constrained user interface
C) temporal isolation
D) None of these
سؤال
Under TCSEC,the ____ is the combination of all hardware,firmware,and software responsible for enforcing the security policy.

A) trusted computing base
B) reference monitor
C) covert channel
D) verification module
سؤال
Storage of classified documents must be accessible only to authorized individuals,which usually requires which of the following?

A) Safes
B) Locking file cabinets
C) Other protective devices for hard copies
D) All of these
سؤال
Under TCSEC,the ____ is the piece of the system that manages access controls-in other words,it mediates all access to objects by subjects.

A) trusted computing base
B) reference monitor
C) covert channel
D) verification module
سؤال
____ access controls are determined by a central authority and can be based on roles or tasks.

A) Mandatory
B) Nondiscretionary
C) Discretionary
D) Lattice-based
سؤال
Under the TCSEC model,the term ____ refers to the rules of configuration for a system,rather than a managerial guidance document.

A) reference monitor
B) trusted
C) covert
D) security policy
سؤال
Access to a specific set of information may be dependent on its subject matter is called ____.

A) content-dependent access controls
B) constrained user interfaces
C) temporal isolation
D) None of these
سؤال
Under lattice-based access controls,the row of attributes associated with a particular subject (such as a user)is referred to as a(n)____.

A) access control list
B) capabilities table
C) access control matrix
D) sensitivity level
سؤال
Under the Bell-LaPadula model,the ____ property prohibits a high-level subject from sending messages to a lower-level object.In short,subjects can read down and objects can write or append up.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
سؤال
What is the highest level of protection or evaluation which a system can be assigned under TCSEC?

A) A1
B) B1
C) B3
D) Beyond A1
سؤال
The Clark-Wilson model,designed for commercial environments is a(n)____ model.

A) confidentiality
B) integrity
C) availability
D) None of these
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/120
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Security Management Models
1
When MACs are implemented,users and data owners have limited control over access to information resources.
True
2
Separation of duties is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.
False
3
Information Technology-Code of Practice for Information Security Management was originally published as British Standard BS7799.
True
4
In the TCSEC,the reference monitor is the combination of all hardware,firmware,and software responsible for enforcing the security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
5
Management controls deal with the functions of security that have been integrated into the repeatable processes of the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
6
ISO 27002 is an international standard for computer security certification,considered to be the successor to both TCSEC and ITSEC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
7
There are two types of covert channels,storage channels and network channels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
8
Role-based controls are tied to the role that a particular user performs in an organization,whereas content-based controls are tied to a particular assignment or responsibility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
9
Compensating controls remedy a circumstance or mitigate damage done during an incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
10
Lattice-based access control assigns users a matrix of authorizations for particular areas of access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
11
TCSEC is also known as the "Orange Book" and is considered the cornerstone of the DoD Rainbow Series that defines the criteria for assessing the access controls in a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
12
Within lattice-based access controls,the row of attributes associated with a particular subject (such as a user)is referred to as a capabilities table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
13
ITSEC is the international set of equivalent for evaluating computer systems,and is very similar to the TCSEC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
14
In rule-based access controls,access is granted based on a set of rules which may be specified by the central authority.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
15
The 'need to know' principle limits a user's access to the specific information required to perform the currently assigned task,and not merely to the category of data required for a general work function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
16
All security models discussed in the text are freely available to the public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
17
ISO/IEC 17799 is designed to promote certification of information security management system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
18
Bell-LaPadula security rules prevent information from being moved from a level of higher security to a level of lower security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
19
Preventative controls discourage or deter an incipient incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
20
An information security blueprint describes existing controls and identifies other necessary security controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
21
Under the Clark-Wilson model,internal consistency means that the system is consistent with similar data in the outside world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
22
An ATM machine is a common example of a(n)constrained user interface form of access control._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
23
Operational controls cover security processes designed by strategic planners,are integrated into the organization's management practices and are routinely used by security administrators to design,implement and monitor other control systems._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
24
TCSEC is a U.S.DoD standard that is also known as the Red Book,because of its color-coding._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
25
Need to know limits a user's access to the specific information required to perform the currently assigned task,and not merely to the category of data required for a general work function._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
26
The trusted computing base is the piece of the system that manages access controls under TCSEC._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
27
The NIST Security model documents enjoy two notable advantages over many other sources of security information: (1)They are publicly available at no charge,and (2)they have been available for some time and thus have been broadly reviewed by government and industry professionals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
28
Covert channels are unauthorized or unintended methods of communications hidden inside a computer system._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ITSEC is the international set of criteria for evaluating computer systems and is very similar to the TCSEC._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
30
The major process steps in the ISO 27000 series include Plan-Do-Check-Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
31
The information security blueprint serves as the basis for the design,selection,and implementation of all subsequent security controls._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
32
Discretionary controls are determined by a central authority in the organization._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
33
Deterrent controls help an organization avoid an incident._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
34
Another data classification scheme is the personnel security clearance structure,in which each user of an information asset is assigned an authorization level that identifies the level of information classification he or she can access._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
35
Under the Common Criteria for IT Security Evaluation,a(n)Security Target is the system being evaluated._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
36
A security framework is a generic blueprint offered by a service organization._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
37
Classified documents should not be disposed of in trash otherwise people who engage in refuse recovery (digging through the trash)may retrieve information and thereby compromise the security of the organization's information assets._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
38
COBIT is an IT development framework and supporting toolset that allows managers to bridge the gap between control requirements,technical issues,and design specifications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
39
The Brewer-Nash model is commonly known as a Japanese wall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
40
In an access control matrix,as part of lattice-based controls,the column of attributes associated with a particular object (such as a printer)is referred to as a(n)capability table._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
41
The individual categories of data classification (Unclassified,Confidential,Secret etc.)are also called ____.

A) discretionary access controls
B) task-based access controls
C) security clearances
D) sensitivity levels
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
42
____ is an international standard framework that is based on the security model Information Technology-Code of Practice for Information Security Management.

A) ISO/IEC 17799
B) NIST SP 800-12
C) RFC 2196
D) NIST SP 800-26
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
43
The primary objective of the Committee of Sponsoring Organizations of the Treadway Commission (COSO),a private-sector initiative formed in 1985,is to identify the factors that cause fraudulent financial reporting and to make recommendations to reduce its incidence._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
44
Controls that remedy a circumstance or mitigate damage done during an incident as called ____,

A) preventative
B) deterrent
C) corrective
D) compensating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n)____ is a generic blueprint offered by a service organization.

A) framework
B) security outline
C) organizational model
D) security model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
46
The Biba model is a state machine model that helps ensure the confidentiality of an information system by means of MACs,data classification,and security clearances._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
47
One of the key elements of the Clark-Wilson model is the unconstrained data item which is a data item with protected integrity._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
48
Controls that are tied to the position assigned to and performed by an individual user in the organization are called ____.

A) mandatory access controls
B) lattice-based access controls
C) role-based access controls
D) rule-based access controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
49
The original purpose of ISO/IEC 17799 was to give recommendations for information security management for use by those who are responsible for initiating,implementing,or maintaining security in their organization._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
50
The objective of COBIT is to identify the factors that cause fraudulent financial reporting and to make recommendations to reduce its incidence._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
51
Controls that discourage an incipient incident are called ____.

A) preventative
B) deterrent
C) corrective
D) compensating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
52
Controls that help an organization avoid an incident are called ____.

A) preventative
B) deterrent
C) corrective
D) compensating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
53
The principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties is known as ____.

A) need-to-know
B) eyes only
C) least privilege
D) separation of duties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
54
One discretionary model is ____,in which access is granted based on a set of rules specified by the central authority.

A) mandatory access controls
B) lattice-based access controls
C) role-based access controls
D) rule-based access controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
55
Controls that are structured and coordinated within a data classification scheme that rates each collection of information as well as each user are called ____.

A) mandatory access controls
B) lattice-based access controls
C) role-based access controls
D) rule-based access controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
56
____ specifies the authorization classification of information asset an individual user is permitted to access,subject to the need-to-know principle.

A) Discretionary access controls
B) Task-based access controls
C) Security clearances
D) Sensitivity levels
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
57
The U.S.government data classification and security clearance system is an example of which of the following types of access controls?

A) Mandatory access controls
B) Lattice-based access controls
C) Role-based access controls
D) Rule-based access controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
58
A control requiring that significant tasks be split up in such a way that more than one individual is responsible for their completion is known as ____.

A) need-to-know
B) eyes only
C) least privilege
D) separation of duties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
59
An outline of an information security blueprint is called a(n)____.

A) summary
B) framework
C) index
D) model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is the primary purpose of ISO/IEC 27001:2005?

A) Use within an organization to formulate security requirements and objectives
B) Implementation of business-enabling information security
C) Use within an organization to ensure compliance with laws and regulations
D) To enable organizations that adopt it to obtain certification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
61
Under the TCSEC model,the term ____ can be misleading-note that in this context,it means that components are part of the TCB security system,but it does not necessarily follow that they are all above reproach.

A) reference monitor
B) trusted
C) covert
D) security policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
62
Under the Biba model,the ____ property permits a subject to have write access to an object only if the security level of the subject is equal to or higher than that of the object.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
63
Under lattice-based access controls,the column of attributes associated with a particular object (such as a printer)is referred to as a(n)____.

A) access control list
B) capabilities table
C) access control matrix
D) sensitivity level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
64
Under the Common Criteria,____ is the document describing the system being evaluated's security properties.

A) Target of Evaluation (ToE)
B) Protection Profile (PP)
C) Security Target (ST)
D) Security Functional Requirements (SFRs)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
65
____ access controls are implemented at the option of the data user.

A) Mandatory
B) Nondiscretionary
C) Discretionary
D) Lattice-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
66
Under ITSEC,what is the highest level of assessment a product can be rated?

A) EAL7
B) E1
C) E6
D) A1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
67
Under the Bell-LaPadula model,the ____ property prohibits a subject of lower clearance from reading an object of higher classification,but allows a subject with a higher clearance level to read an object at a lower level.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
68
Under the Common Criteria,____ is the user-generated specifications for security requirements.

A) Target of Evaluation (ToE)
B) Protection Profile (PP)
C) Security Target (ST)
D) Security Functional Requirements (SFRs)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
69
Under the Biba model,the ____ property permits a subject to have read access to an object only if the security level of the subject is either lower or equal to the level of the object.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
70
An Automated Teller Machine (ATM)is an example of a ____.

A) content-dependent access control
B) constrained user interface
C) temporal isolation
D) None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
71
Under TCSEC,the ____ is the combination of all hardware,firmware,and software responsible for enforcing the security policy.

A) trusted computing base
B) reference monitor
C) covert channel
D) verification module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
72
Storage of classified documents must be accessible only to authorized individuals,which usually requires which of the following?

A) Safes
B) Locking file cabinets
C) Other protective devices for hard copies
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
73
Under TCSEC,the ____ is the piece of the system that manages access controls-in other words,it mediates all access to objects by subjects.

A) trusted computing base
B) reference monitor
C) covert channel
D) verification module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
74
____ access controls are determined by a central authority and can be based on roles or tasks.

A) Mandatory
B) Nondiscretionary
C) Discretionary
D) Lattice-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
75
Under the TCSEC model,the term ____ refers to the rules of configuration for a system,rather than a managerial guidance document.

A) reference monitor
B) trusted
C) covert
D) security policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
76
Access to a specific set of information may be dependent on its subject matter is called ____.

A) content-dependent access controls
B) constrained user interfaces
C) temporal isolation
D) None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
77
Under lattice-based access controls,the row of attributes associated with a particular subject (such as a user)is referred to as a(n)____.

A) access control list
B) capabilities table
C) access control matrix
D) sensitivity level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
78
Under the Bell-LaPadula model,the ____ property prohibits a high-level subject from sending messages to a lower-level object.In short,subjects can read down and objects can write or append up.

A) star (*)
B) simple security
C) integrity star (*)
D) simple integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
79
What is the highest level of protection or evaluation which a system can be assigned under TCSEC?

A) A1
B) B1
C) B3
D) Beyond A1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
80
The Clark-Wilson model,designed for commercial environments is a(n)____ model.

A) confidentiality
B) integrity
C) availability
D) None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.